File name:

MetaSkins.exe

Full analysis: https://app.any.run/tasks/cbcae7b6-b8c1-4599-a5ed-a51eefc34b08
Verdict: Malicious activity
Analysis date: May 12, 2025, 10:58:56
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

60503419745150AA85FF9382E3674547

SHA1:

0570DFE0BC7C7CDAB792E5CC46A348C8EACFE098

SHA256:

51E0A1413546BBB9C9087F83432B289AFC34643DAAC298EDA2E63301F4874F3E

SSDEEP:

98304:xO+lCLDDfppLDOisBZoGg7Pz0jSnPug5DZ2BrB/Jn8tJI2tWxp8nre1jCiFQ/+vr:2PMt8g

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • MetaSkins.exe (PID: 4428)
    • Executable content was dropped or overwritten

      • MetaSkins.exe (PID: 4428)
      • cmd.exe (PID: 7504)
      • MetaSkins.exe (PID: 7592)
    • Reads the date of Windows installation

      • MetaSkins.exe (PID: 4428)
    • Starts CMD.EXE for commands execution

      • MetaSkins.exe (PID: 4428)
    • Executing commands from a ".bat" file

      • MetaSkins.exe (PID: 4428)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 7504)
    • The executable file from the user directory is run by the CMD process

      • MetaSkins.exe (PID: 7592)
    • Process drops legitimate windows executable

      • MetaSkins.exe (PID: 7592)
    • Reads the BIOS version

      • MetaSkins.exe (PID: 7592)
  • INFO

    • Create files in a temporary directory

      • MetaSkins.exe (PID: 4428)
    • Process checks computer location settings

      • MetaSkins.exe (PID: 4428)
    • Reads the computer name

      • MetaSkins.exe (PID: 4428)
      • MetaSkins.exe (PID: 7592)
    • Checks supported languages

      • MetaSkins.exe (PID: 4428)
      • MetaSkins.exe (PID: 7592)
    • The sample compiled with english language support

      • MetaSkins.exe (PID: 7592)
    • Reads the software policy settings

      • slui.exe (PID: 7256)
      • slui.exe (PID: 8000)
    • Process checks whether UAC notifications are on

      • MetaSkins.exe (PID: 7592)
    • Checks proxy server information

      • slui.exe (PID: 8000)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:04:08 22:15:21+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.44
CodeSize: 2159616
InitializedDataSize: 1353216
UninitializedDataSize: -
EntryPoint: 0x1cdaf0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
141
Monitored processes
9
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start metaskins.exe sppextcomobj.exe no specs slui.exe cmd.exe conhost.exe no specs timeout.exe no specs metaskins.exe slui.exe metaskins.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1276"C:\Users\admin\AppData\Local\Temp\MetaSkins.exe" C:\Users\admin\AppData\Local\Temp\MetaSkins.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\metaskins.exe
c:\windows\system32\ntdll.dll
4428"C:\Users\admin\AppData\Local\Temp\MetaSkins.exe" C:\Users\admin\AppData\Local\Temp\MetaSkins.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
4294967295
Modules
Images
c:\users\admin\appdata\local\temp\metaskins.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
7220C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7256"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7504C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\update.bat" "C:\Windows\System32\cmd.exe
MetaSkins.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
7512\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7568timeout /t 1 /nobreak C:\Windows\System32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
timeout - pauses command processing
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7592"C:\Users\admin\AppData\Local\Temp\MetaSkins.exe" C:\Users\admin\AppData\Local\Temp\MetaSkins.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\metaskins.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
8000C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 877
Read events
1 877
Write events
0
Delete events
0

Modification events

No data
Executable files
5
Suspicious files
5
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
7592MetaSkins.exeC:\Users\admin\Documents\MetaSkins\dota_files\MetaSkinsLowPolyMap.zip
MD5:
SHA256:
4428MetaSkins.exeC:\Users\admin\Documents\MetaSkins\kernel.dllexecutable
MD5:976002D5E43AB54BA33009537376ED1F
SHA256:9704AC5F492FDB9E591866CF797ABC50ED4DEB6A81204F62FDA8082214958869
4428MetaSkins.exeC:\Users\admin\AppData\Local\Temp\update.battext
MD5:B6B729F66EB1C885AB37687B856B6B43
SHA256:CD65158CF0E3C7B30797E8C579D5D19E5AB1C31BD05E6D120BC5B0CC7507AD43
7592MetaSkins.exeC:\Users\admin\Documents\MetaSkins\config_Dota2.jsonbinary
MD5:74BD9A116A1C69E605315D5FFADABD70
SHA256:BE42F58C945F8478E7A1D8525210C919D92F4B190E17A420679CEFDDBCAEC479
4428MetaSkins.exeC:\Users\admin\AppData\Local\Temp\MetaSkins.exe_updexecutable
MD5:AD425F4B5DFD2B281A4EA1039A4AA9BD
SHA256:B8A7E284A68A13255D9DC0BB0DF30AFED4A5C10A6F77A57EF6E4C4A507F9BA7F
4428MetaSkins.exeC:\Users\admin\Documents\MetaSkins\launcher.jsonbinary
MD5:98667EF98FB22756AEF1D53FA3373B92
SHA256:044E0424A65C5E87F82F282AA4A5AD0BB0C7AECE389DAF8CF7F7F216F27C425E
7592MetaSkins.exeC:\Users\admin\Documents\MetaSkins\config_CS2.jsonbinary
MD5:93C25D2E0C152030F3822F73B11FE325
SHA256:949E2C695A2BEEED104402BD94CB9F6C90619F0F6CE586ADBCCCB12550B857C2
7592MetaSkins.exeC:\Users\admin\Documents\MetaSkins\symsrv.dllexecutable
MD5:CAE67C24308AA631784B44096727F5C5
SHA256:51DA071BAB34ABC9DB349B471F24E06697CFA65F6F74E4CD995E09CF9E96BC35
7504cmd.exeC:\Users\admin\AppData\Local\Temp\MetaSkins.exeexecutable
MD5:AD425F4B5DFD2B281A4EA1039A4AA9BD
SHA256:B8A7E284A68A13255D9DC0BB0DF30AFED4A5C10A6F77A57EF6E4C4A507F9BA7F
7592MetaSkins.exeC:\Users\admin\Documents\MetaSkins\dota_files\maps.zipcompressed
MD5:E071AD45B54493830105616A748CC65A
SHA256:2747C77E2360A5E6711FFB2D8E10F2B298FE95CE493E60987504E046FAD4A6F3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
26
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
88.221.110.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
756
lsass.exe
GET
200
216.58.206.35:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
7800
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
756
lsass.exe
GET
200
216.58.206.35:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
7800
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
88.221.110.114:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
4428
MetaSkins.exe
172.67.186.238:443
api.metaskins.gg
CLOUDFLARENET
US
unknown
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
756
lsass.exe
216.58.206.35:80
c.pki.goog
GOOGLE
US
whitelisted
6544
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
7592
MetaSkins.exe
172.67.186.238:443
api.metaskins.gg
CLOUDFLARENET
US
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 88.221.110.114
  • 88.221.110.122
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
api.metaskins.gg
  • 172.67.186.238
  • 104.21.2.85
unknown
client.wns.windows.com
  • 172.211.123.249
whitelisted
c.pki.goog
  • 216.58.206.35
whitelisted
login.live.com
  • 20.190.159.75
  • 40.126.31.0
  • 20.190.159.129
  • 40.126.31.128
  • 40.126.31.2
  • 20.190.159.131
  • 20.190.159.64
  • 20.190.159.23
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted

Threats

No threats detected
No debug info